Sciweavers

303 search results - page 28 / 61
» Unifying Theories of Confidentiality
Sort
View
CHI
2011
ACM
13 years 1 months ago
Motionbeam: a metaphor for character interaction with handheld projectors
We present the MotionBeam metaphor for character interaction with handheld projectors. Our work draws from the tradition of pre-cinema handheld projectors that use direct physical...
Karl D. D. Willis, Ivan Poupyrev, Takaaki Shirator...
ICIP
2009
IEEE
14 years 11 months ago
Monotone Operator Splitting For Optimization Problems In Sparse Recovery
This work focuses on several optimization problems involved in recovery of sparse solutions of linear inverse problems. Such problems appear in many fields including image and sig...
RTSS
2000
IEEE
14 years 2 months ago
Performance Specifications and Metrics for Adaptive Real-Time Systems
While early research on real-time computing was concerned with guaranteeing avoidance of undesirable effects such as overload and deadline misses, adaptive real-time systems are d...
Chenyang Lu, John A. Stankovic, Tarek F. Abdelzahe...
BANFF
1995
14 years 1 months ago
An Automata-Theoretic Approach to Linear Temporal Logic
The automata-theoretic approach to linear temporal logic uses the theory of automata as a unifying paradigm for program specification, verification, and synthesis. Both programs ...
Moshe Y. Vardi
AVI
2000
13 years 11 months ago
Diagrams Based on Structural Object Perception
Most diagrams, particularly those used in software engineering, are line drawings consisting of nodes drawn as rectangles or circles, and edges drawn as lines linking them. In the...
Pourang Irani, Colin Ware